Search Results - (( development among module algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- development among »
- implication based »
- module algorithm »
- java implication »
- among module »
-
1
Building a French Stemmer Using a Dictionary of French Root Words
Published 1999“…In this thesis, a strong French stemming algorithm based on a dictionary of French root words is developed. …”
Get full text
Get full text
Thesis -
2
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
3
Chess tournament management system (pairing module)
Published 2005“…So for that, in order to overcome the problem, Chess Pairing module needs to be developed.The development of chçss pairing module of Chess Tournament Management System is suggested for handling the player pairing and colour allocation in every match.A Software Development Life Cycle (SDLC) is use as a method in the development of this system.Chess Pairing module will use Gale Shapley method as a based idea to develop an algorithm to do the entire pairing and colour allocation task.…”
Get full text
Get full text
Undergraduates Project Papers -
4
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The statistical order was classified based on the latency and the effectiveness of recognition among the identified modulation schemes. The average latency for each QPSK, MSK, QASK, and BPSK modulation scheme is approximately 20ms. …”
Get full text
Get full text
Thesis -
5
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. Among them, inverse and multiplier are the most complex modules with longer delay. …”
Get full text
Get full text
Thesis -
6
-
7
Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter
Published 2018“…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Handwriting recognition using webcam for data entry
Published 2014“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Final Year Project -
9
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The objective of this research was to develop and analyse feature extraction used for classification techniques for defect detection of solar photovoltaic modules surfaces. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This encryption standard uses KeyExpansion, ByteSub, Mixcolumn and Shiftrow functions which consists of XOR, inverse, multiplying and swap modules. Among them, inverse and multiplier are the most complex modules with longer delay. …”
Get full text
Get full text
Article -
11
Stereo vision based robotic bin picking system for agile manufacturing
Published 2011Get full text
Working Paper -
12
Design and implementation of a new multilevel inverter topology with shared power switches / Jafferi bin Jamaludin
Published 2014“…The hardware prototype of the proposed multilevel inverter using digital signal processors (DSPs) in implementing the proposed modulation and current control algorithms has been developed for validation.…”
Get full text
Get full text
Thesis -
13
Handwriting recognition using webcam for data entry
Published 2015“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Conference or Workshop Item -
14
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…In this study, a four-module 980 W solar PV system together with a DC/DC Boost Converter model was developed in MATLAB-Simulink as the MPPT algorithm test platform. …”
Get full text
Get full text
Thesis -
15
The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts
Published 2022“…This study examined the effectiveness of STEAM (Science, Technology, Engineering, Art, Mathematics) integrated approach via Scratch module in enhancing and retaining achievement, computational thinking (CT) and five subconstructs of CT in learning electricity concepts among 29 male and 30 female Form two secondary school students through Scratch module, which was developed based on ASSURE model. …”
Get full text
Get full text
Thesis -
16
-
17
Selective harmonic elimination in cascaded H-bridge multilevel inverter using hybrid APSO algorithm / Mudasir Ahmed
Published 2019“…In both algorithms, global searching is performed by APSO algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
-
20
An 11-switch multilevel inverter with a modified space vector modulation
Published 2016“…A novel voltage control scheme based on space vector modulation is developed by introducing a virtual vector in every sector of the vector hexagon. …”
Get full text
Get full text
Get full text
Article
